Across
- 2. Software which records and transmits key strokes
- 4. The use of fake websites to collect credentials from unsuspecting users.
- 7. Directive access control that sets out the expectations and responsibilities for employees.
- 10. Should be carried out yearly to ensure security systems are suitable and uptodate.
- 11. A range of methods that prey upon human mistakes rather than digital systems.
- 12. Types of attacks that change, damage or delete data and systems.
- 13. Applied to systems to fix known problems.
- 14. Uses a key to convert data into an unintelligible form.
- 15. Appears as or is part of a legitimate file but is actually malicious code.
- 17. determins which parts of an IP address should match or not for authorisation.
- 18. A _ would allow unauthorised users access to something.
- 20. The E in WEP (Something which should not be used anymore)
- 21. Leaving discarded, infected, portable media in the open hoping someone will run it on a device.
- 23. Following people closely through secured doors.
- 24. Once in a system will spread automatically depending on its programming.
- 26. The U in UAC
- 27. Hackers can make use of these to gain access to systems and bypass security.
Down
- 1. Checks incoming and outgoing traffic to ensure it is authorised based on credentials such as IP Addresses.
- 3. Where an identity is disguised to appear as a trusted source.
- 4. A type of attack when data is monitored and not changed.
- 5. Using an authorised users credentials when they are already logged in.
- 6. Anti Virus software keeps a record of known malicious code within this.
- 8. Fake emails used to gain information and credentials from targets.
- 9. This is what malware is short for.
- 10. After we _ users, they are given authorised access.
- 16. Requires human interaction to run.
- 19. An attack that encrypts data until a payment is made.
- 22. A type of attack that makes use of an exploit to bypass security measures.
- 25. A denial of service attack that makes use of multiple devices.
